Advertisement

The Transparency of Big Data, Data Harvesting and Digital Twins

  • Stefan Kendzierskyj
  • Hamid JahankhaniEmail author
  • Arshad Jamal
  • Jaime Ibarra Jimenez
Chapter
Part of the Advanced Sciences and Technologies for Security Applications book series (ASTSA)

Abstract

Computer storage and cloud computing has become more powerful with multiple algorithms running complex data analysis looking at intelligence trends, user behaviour, profiling and ways to make use of these outputs. Added with the artificial intelligence (AI) interaction has meant a new and dynamic method to create models forging analysis to be more clinical, proficient and continually seeking more improvement with the self-learning and intelligent programming of machine learning (ML). In the healthcare sector there is deep interest in collecting, curating the data and making the best use of silo’d data through methods such as blockchain. This can then lead to a multitude of innovations such as precision based medicine, targeting individual variability in genes, their environment, etc. It also means that big data analytics in healthcare is evolving into providing these insights from very large data sets and improving outcomes while reducing costs and inefficiencies. However, there also are some ethical impacts in the process of Digital Twins which can lead to segmentation and discrimination. Or perhaps the data that is automatically collected from healthcare sensors in IoMT and what type of governance are they scrutinized to. It is clear that data is the most important asset of not just an organisation but also to the individual and why the General Data Protection Regulation (GDPR) has taken an important stance in data protection by design and default, that all organisations needs to follow. This chapter aims to highlight some of the concerns.

Keywords

Data Harvesting Digital Twin Big data Transparency eHealth Healthcare Social media 

References

  1. Boyd D, Ellison NB (2008) Social network sites: definition, history, and scholarship. J Comput-Mediat Commun 13:210–230CrossRefGoogle Scholar
  2. Cave A (2017) What will we do when the world’s data hits 163 Zettabytes in 2025? Forbes. Available at: https://www.forbes.com/sites/andrewcave/2017/04/13/what-will-we-do-when-the-worlds-data-hits-163-zettabytes-in-2025/#25ed8bc9349a. Accessed 10 Nov 2018
  3. Hill K (2012) How target figured out a teen girl was pregnant before her father did. Forbes. Available at: https://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/#4ee09e726668. Accessed 11 Nov 2018
  4. Hoadley MC, Xu H, Lee J, Rosson MB (2010) Privacy as information access and illusory control: the case of the facebook news feed privacy outcry. Electron Commer Res Appl (Special Issue on Social Networks and Web 2.0), 9(1):50–60CrossRefGoogle Scholar
  5. Kohavi R, Provost F (2010) Applications of data mining to electronic commerce. Data Mining and Knowledge Discovery, 5(1/2), 2001. Retrieved on September 15, 2010, from http://robotics.stanford.edu/~ronnyk/ecommerce-dm/editorial.pdf
  6. Kohavi R, Rothleder NJ, Simoudis E (2002) Emerging trends in business analytics. Commun ACM 45(8):45–48CrossRefGoogle Scholar
  7. Kramer S (2015) The big risks of big data mining. V3B. Available at: https://v3b.com/2015/06/the-big-risks-of-big-data-mining/. Accessed 11 Nov 2018
  8. Krishnamurthy B, Wills EC (2010) On the leakage of personally identifiable information via online social networks. SIGCOMM Comput Commun Rev 40(1):112–117CrossRefGoogle Scholar
  9. Marr B (2018) ‘how much data do we create every day? The mind-blowing stats everyone should read’. Forbes. Available at: https://www.forbes.com/sites/bernardmarr/2018/05/21/how-much-data-do-we-create-every-day-the-mind-blowing-stats-everyone-should-read/#2a7b7b3760ba. Accessed 10 Nov 2018
  10. Ng K, Kakkanatt C, Benigno M, Thompson C, Jackson M, Cahan A, Zhu X, Zhang P, Huang P (2015) Curating and integrating data from multiple sources to support healthcare analytics. Stud Health Technol Inform 216:1056Google Scholar
  11. Pepitone J (2010) 5 Data breaches: From embarrassing to deadly. CNN Money. Available at: https://money.cnn.com/galleries/2010/technology/1012/gallery.5_data_breaches/index.html. Accessed 11 Nov 2018
  12. Young AL, Quan-Haase A (2009) Information revelation and internet privacy concerns on social network sites: a case study of Facebook, ACMGoogle Scholar
  13. Zhang M, Jansen BJ, Chowdhury A (2011) Business engagement on Twitter: a path analysis. Electron Mark 21:161–175CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Stefan Kendzierskyj
    • 1
  • Hamid Jahankhani
    • 1
    Email author
  • Arshad Jamal
    • 1
  • Jaime Ibarra Jimenez
    • 1
  1. 1.London CampusNorthumbria UniversityLondonUK

Personalised recommendations